Flaws were found in the way PCRE handles certain malformed regularexpressions. If an application linked against PCRE, such as Konqueror,parses a malicious regular expression, it may be possible to run arbitrarycode as the user running the application. (CVE-2006-7224)

Users of PCRE are advised to upgrade to these updated packages, whichcontain a backported patch to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/FAQ_58_10188